Security and compliance rank as the top challenges for deploying cloud-native apps

Image: natali_mis/ Adobe Stock
As more business kick their digital transformation projects into high equipment, theres been a rise in the development of cloud-native applications. This has led to a rise in digital work being released utilizing cloud-native containers and platforms, but this increased dependence on the cloud for applications also brings with it key challenges. A report launched Wednesday by cloud-native application platform Tigera analyzes a few of the challenges and uses pointers on how to handle them.
Tigeras State of Cloud-Native Security report is based upon a study of 304 security and IT specialists from around the globe. The participants carry out various roles across various markets, all of them are straight responsible for working with containers.

Cloud-native applications are growing in appeal but can provide concerns related to security, compliance and observability, says Tigera.

Must-read security protection

Let you develop a security moat around important workloads to reduce risk.
Allow you to deploy honeypods to fight zero-day attacks.
Automatically quarantine potentially malicious and suspicious workloads.
Let you personalize notifies to automatically remediate hazards.

As more business kick their digital transformation projects into high gear, theres been a surge in the advancement of cloud-native applications. A report released Wednesday by cloud-native application platform Tigera examines some of the obstacles and uses tips on how to manage them.
Some 96% of the respondents pointed to security, compliance and observability as the leading three most tough aspects of cloud-native applications. Observability was taped as one of the crucial obstacles as IT and security professionals often do not have the required presence into their cloud-native applications. To help them get much better insight into their cloud-native applications, the respondents expressed a need for specific tools and technologies.

Among those surveyed, 75% stated that their business have focused most of their brand-new development efforts on cloud-native applications. Provided the often temporal and dynamic nature of the cloud, they likewise acknowledged a number of difficulties in this initiative.
Some 96% of the participants pointed to security, compliance and observability as the leading 3 most tough aspects of cloud-native applications. Container security was cited as the biggest obstacle by 68%.
These difficulties wind up slowing down cloud-native application releases for numerous companies. Asked which products are the most significant impediments to an implementation, 67% pointed out security requirements, 56% pointed to compliance requirements and 44% discussed a lack of automation.
To assist them deal with the security issues that come with cloud-native applications, participants said they need to decrease application attack surface areas and quickly determine hazards. Towards that end, they mentioned a number of tools that could help, consisting of container-level firewalls, workload access infrastructure, control and microsegmentation privilege management.
SEE: Password breach: Why pop culture and passwords do not mix (totally free PDF) (TechRepublic).
Observability was recorded as one of the essential obstacles as IT and security professionals frequently do not have the essential presence into their cloud-native applications. Asked what observability issues are the most discouraging, 51% cited the lack of actionable insights, indicating no way to see the source of a problem or suggestions for resolving it. Some 43% indicated an absence of visibility into microservices, indicating an inability to see interactions and dependencies amongst applications.
To help them acquire much better insight into their cloud-native applications, the respondents revealed a need for particular tools and technologies. Some 76% stated they need a runtime visualization of their environment to see and understand interactions and habits. Some 57% wish to be able to discover performance hotspots, and 47% need a way to capture vibrant packages.
How to protect your cloud-native applications.
To much better secure your cloud-native applications against security hazards and other problems, Tigera offers a few crucial suggestions:.
Embrace absolutely no trust to minimize the attack surface area. The primary step is to implement a zero trust environment to protect the flow of data in between various cloud-based work. For this, youll want to set up more granular controls over DNS policies, network sets and other resources. You ought to likewise use microsegmentation to separate work based on application tiers, compliance requirements and user access.
The goal is to protect your cloud-based workloads from external risks and lateral movement by enemies. To do this, youll desire application-level security and a web application firewall.

The best way to deal with breaches is by dynamically reacting to dangers. For this, you need a tool that uses a runtime visualization of your environment so you can monitor for suspicious behavior, troubleshoot connectivity issues and find efficiency problems.

Examines hazard feeds and lets you produce customized threat feeds.
Displays incoming and outbound traffic.
Utilizes device discovering to find zero-day dangers.
Supplies workload-based packet inspection to take a look at network data in information.
Utilizes signature-based detection to hunt down prospective risks.
Offers advanced anomaly detection so regarding acknowledge, isolate and remediate threats from unknown attacks.


Leave a Comment